A New Risk Assessment Approach for Cloud Consumer
A New Risk Assessment Approach for Cloud Consumer
出处
《通讯和计算机(中英文版)》
2014年第1期52-58,共7页
Journal of Communication and Computer
参考文献18
-
1Cloud Security Alliance (CSA): Top threats to cloud computing, version 1.0. http://www.cloudsecurityalliance.org/topthreats/csathreat s.vl.0.pdf (accessed March 2010).
-
2B.S. Kaliski Jr., W. Pauley, Toward Risk Assessment as a Service in Cloud Environment, EMC Corporation, Hopkinton, MA, USA, 2010.
-
3EBIOS, Central Directorate for Information Systems Security [Online], http://www.ssi.gouv.fr.
-
4Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE), Software Engineering Institute, Carnegie Mellon, 1999.
-
5Method Harmonized Risk Analysis (MEHARI) Principles and mechanisms CLUSIF, Issue 3, October 2004.
-
6P. Saripalli, B. Walters, QUIRC: A quantitative impact and risk assessment framework for cloud security, in: Proceedings of the IEEE 3rd International Conference on Cloud Computing, Miami, FL, July 5-10, 2010.
-
7L. Peiyu, L. Dong, The new risk assessment model for information system in cloud computing environment, Procedia Engineering 15 (2011) 3200-3204.
-
8Z. Xuan, N. Wuwong, Information security risk management framework for the cloud computing environments, in: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, June 29 -July 01, 2010.
-
9A. Sangroya, S. Kumar, J. Dhok, V. Varma, Towards analyzing data security risks in cloud computing environments, international conference on information systems, Technology, and Management Communications in Computer and Information Sciences 54 (2010) 255- 256.
-
10R. Farrell, Securing the cloud-governance, risk and compliance issues reign supreme, Information Security Journal: A Global Perspective 19 (2010) 310-319.
-
1The 2nd National Expert Committee on Risk Assessment of Farm-Products'Quality and Safety Established in Beijing[J].Feed & Livestock,2013,6(1):26-27.
-
22014 The Second International Conference on Advanced Cloud and Big Data(CBD 2014)[J].ZTE Communications,2014,12(2):2-2. 被引量:1
-
3Ngoc Luan Mai,Oktay Erten,Erkan Topal.A new generic open pit mine planning process with risk assessment ability[J].International Journal of Coal Science & Technology,2016,3(4):407-417. 被引量:2
-
4第四届信息安全漏洞分析与风险评估大会征文通知[J].计算机工程与设计,2011,32(3).
-
5第四届信息安全漏洞分析与风险评估大会(VARA 2011)征文通知[J].计算机应用,2011,31(4).
-
6Hanyun Wang,Kangyuan Wang,Yunxiao Zhang,Guoqiang Mei,Mingming Wu.Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System[J].Journal of Energy and Power Engineering,2012,6(3):485-487.
-
7第八届信息安全漏洞分析与风险评估大会(VARA 2015)征文通知[J].中国信息安全,2015,0(5):99-99.
-
8LI Hetian LIU Yun HE Dequan.A Fuzzy Set-Based Approach for Model-Based Internet-Banking System Security Risk Assessment[J].Wuhan University Journal of Natural Sciences,2006,11(6):1869-1872. 被引量:3
-
9李卫国,俞乾,罗日成.Application of fuzzy analytic hierarchy process and neural network in power transformer risk assessment[J].Journal of Central South University,2012,19(4):982-987. 被引量:8
-
10第四届信息安全漏洞分析与风险评估大会(VARA 2011)征文通知[J].计算机应用,2011,31(5).